Resubmissions

05/12/2022, 11:04

221205-m6al5sch89 1

05/12/2022, 10:51

221205-mxsrcsfh4y 1

Analysis

  • max time kernel
    297s
  • max time network
    331s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 10:51

General

  • Target

    http://elektrosolid.de

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://elektrosolid.de
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1228
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1228 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:432

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          61KB

          MD5

          fc4666cbca561e864e7fdf883a9e6661

          SHA1

          2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

          SHA256

          10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

          SHA512

          c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          9f9524bdf452fbba7d8e2c76eb605615

          SHA1

          21ebb4bbf10607ea2b4052867b99c2bb3c3132bf

          SHA256

          ea74524e3c83b4695461f512a6302d60c5d3a0c5b99ad7c8f15d07ea982af730

          SHA512

          2b0f012a0290d91d23e9c2da926ea45d04431cba76d1c9c4603b567805cb5659d47cc27a67023ba2aa194fcb356ddd59efb06f093b4b2e34b51faf0ac2961828

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4a109f7735b0252d2cf16bca0c66801e

          SHA1

          3bd74fea724f6fb4560942099926e8dac6d360e7

          SHA256

          e5263294b91b303156a45570412bf0918b3a569174b581490a995370740e0a5c

          SHA512

          624a1584986833114477a5ae29a99995a89fd62b42476d8c01d142fdf8d5dda6e72d3015a7db251c2df48e0d46f2470b62d8eb087a1a464581ece58532a33258

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\try74lz\imagestore.dat

          Filesize

          20KB

          MD5

          ccd7c0ad6ef402a5598cf7c9480c4643

          SHA1

          ebe3d99138e76ee50c788a58bdb50062652e8725

          SHA256

          07ffd157f2f85f73451b6aa26e1d281299558bf57bc27b83514a69c50e5578d1

          SHA512

          77703a4b92e0665fed7fa44da4a397035e436f7c04902ccafa5b6b020f19e7d014293c3985b08335f97cc9900a340cb256bcf0c0ef81a1b0ec13265ca41b97d7

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\AUNHP5B4.txt

          Filesize

          608B

          MD5

          c66dbc265ce965bfef05501cf2f0717b

          SHA1

          25d9b7469b0616742044f7e1441eee26066f764b

          SHA256

          5492d0eea7eb797ad82fbffd541271b799ff87723ff05c14a4d31b08ede5437d

          SHA512

          25be85dec34b202a86a679b35f92b9f9366d0ca3f3a9fbf0b77bd617be8046c2c53edec1542115e240d3f850f589c4e8add1a2e46decff920879ab7458c0b3cb